Sciweavers

1207 search results - page 223 / 242
» Towards optimal k-anonymization
Sort
View
KDD
2009
ACM
168views Data Mining» more  KDD 2009»
14 years 9 months ago
Sustainable operation and management of data center chillers using temporal data mining
Motivation: Data centers are a critical component of modern IT infrastructure but are also among the worst environmental offenders through their increasing energy usage and the re...
Debprakash Patnaik, Manish Marwah, Ratnesh K. Shar...
KDD
2008
ACM
142views Data Mining» more  KDD 2008»
14 years 9 months ago
Efficient ticket routing by resolution sequence mining
IT problem management calls for quick identification of resolvers to reported problems. The efficiency of this process highly depends on ticket routing--transferring problem ticke...
Qihong Shao, Yi Chen, Shu Tao, Xifeng Yan, Nikos A...
STOC
2006
ACM
138views Algorithms» more  STOC 2006»
14 years 9 months ago
The PCP theorem by gap amplification
The PCP theorem [3, 2] says that every language in NP has a witness format that can be checked probabilistically by reading only a constant number of bits from the proof. The cele...
Irit Dinur
SIGMOD
2009
ACM
175views Database» more  SIGMOD 2009»
14 years 8 months ago
QoX-driven ETL design: reducing the cost of ETL consulting engagements
As business intelligence becomes increasingly essential for organizations and as it evolves from strategic to operational, the complexity of Extract-Transform-Load (ETL) processes...
Alkis Simitsis, Kevin Wilkinson, Malú Caste...
EDBT
2008
ACM
206views Database» more  EDBT 2008»
14 years 8 months ago
Designing an inductive data stream management system: the stream mill experience
There has been much recent interest in on-line data mining. Existing mining algorithms designed for stored data are either not applicable or not effective on data streams, where r...
Hetal Thakkar, Barzan Mozafari, Carlo Zaniolo